Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-2378-x22r-cqpj

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

ELOG 3.1.4-57bea22 and below is affected by an information disclosure vulnerability. A remote unauthenticated attacker can access the server's configuration file by sending an HTTP GET request. Amongst the configuration data, the attacker may gain access to valid admin usernames and, in older versions of ELOG, passwords.

ELOG 3.1.4-57bea22 and below is affected by an information disclosure vulnerability. A remote unauthenticated attacker can access the server's configuration file by sending an HTTP GET request. Amongst the configuration data, the attacker may gain access to valid admin usernames and, in older versions of ELOG, passwords.

EPSS

Процентиль: 88%
0.04031
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 5 лет назад

ELOG 3.1.4-57bea22 and below is affected by an information disclosure vulnerability. A remote unauthenticated attacker can access the server's configuration file by sending an HTTP GET request. Amongst the configuration data, the attacker may gain access to valid admin usernames and, in older versions of ELOG, passwords.

CVSS3: 7.5
nvd
больше 5 лет назад

ELOG 3.1.4-57bea22 and below is affected by an information disclosure vulnerability. A remote unauthenticated attacker can access the server's configuration file by sending an HTTP GET request. Amongst the configuration data, the attacker may gain access to valid admin usernames and, in older versions of ELOG, passwords.

EPSS

Процентиль: 88%
0.04031
Низкий